CN112887248A - Communication method based on time domain artificial noise - Google Patents
Communication method based on time domain artificial noise Download PDFInfo
- Publication number
- CN112887248A CN112887248A CN202110030405.XA CN202110030405A CN112887248A CN 112887248 A CN112887248 A CN 112887248A CN 202110030405 A CN202110030405 A CN 202110030405A CN 112887248 A CN112887248 A CN 112887248A
- Authority
- CN
- China
- Prior art keywords
- signal
- frequency domain
- artificial noise
- eavesdropper
- matrix
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/26—Systems using multi-frequency codes
- H04L27/2601—Multicarrier modulation systems
- H04L27/2602—Signal structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/11—Arrangements specific to free-space transmission, i.e. transmission through air or vacuum
- H04B10/114—Indoor or close-range type systems
- H04B10/1149—Arrangements for indoor wireless networking of information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/02—Secret communication by adding a second signal to make the desired signal unintelligible
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Noise Elimination (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a communication method based on time domain artificial noise, which comprises the following steps: initializing artificial noise vectors and carrying out precoding to generate target artificial noise orthogonal to a legal channel; carrying out Hermite symmetry on a frequency domain complex signal of a transmitting signal, then carrying out inverse fast Fourier transform to generate a time domain signal vector, inserting a cyclic prefix into the time domain signal vector, and overlapping target artificial noise to form a final transmitting signal; respectively eliminating cyclic prefixes of time domain signals received by a legal user and an eavesdropper, then performing fast Fourier transform to respectively obtain receiving frequency domain signals of the legal user and the eavesdropper, and then respectively performing Hermite inversion symmetry to respectively obtain frequency domain signals Y of the legal userBAnd an eavesdropper frequency domain signal YE(ii) a Using YBRecovering the frequency domain channel matrix of the legal channelFinal received signals of the legal user; using YEAnd recovering the final received signal of the eavesdropper by the frequency domain channel matrix of the eavesdropping channel.
Description
Technical Field
The invention relates to the technical field of wireless optical communication, in particular to a communication method based on time domain artificial noise.
Background
Wireless Optical Communication (OWC) is a technology for Communication by using Wireless Optical waves, has the advantages of wide spectrum and high speed, is considered as a key technology for future indoor multiple access, and is included in the IEEE 802.15.7 standard. At the same time, however, due to the broadcast nature of optical communications, it is very easy to eavesdrop, especially in public places like conference rooms, libraries, shopping malls, etc., and therefore there is a need to increase security using information security techniques.
Conventional information security techniques have mainly focused on upper-layer protocols for communication, using encryption techniques to prevent eavesdropping. However, the encryption technology itself is based on the assumption that the calculation capability of the eavesdropper is limited, and once the key is leaked or the eavesdropper has the calculation capability of brute force cracking, the security cannot be guaranteed. Accordingly, physical layer security techniques have attracted the attention of students in recent years. Among the many physical layer security technologies in the field of Radio Frequency (RF) communication, there is a technology called Artificial Noise (AN), which has a core idea of constructing Artificial Noise by using orthogonality of channels, thereby only interfering with AN eavesdropper and not affecting a legitimate user. This requires the transmitting end to have more degrees of freedom than the legitimate user, which is usually from multiple antennas in radio frequency communication, and this is not applicable to a Single-antenna system like Single-Input Single-Output (SISO). For this reason, there is a document that proposes to utilize the degree of freedom provided by a Cyclic Prefix (CP) in a SISO Orthogonal Frequency Division Multiplexing (OFDM) system.
As described above, the OWC system is also affected by an eavesdropper. However, the OWC system cannot directly use the physical layer security technology in the RF communication system because unlike the RF communication system which transmits complex signals, the OWC system generally transmits unipolar real signals by using an amplitude Modulation and Direct Detection (IM/DD) method. This requires redesigning the physical layer security techniques of the OWC system. For example, the scholars MostafaA and Lampe L first propose to apply AN to AN OWC system to improve the security performance of the system; then Arfaoui MA, Zaid H, Rezki Z, etc. further explore AN AN-based optimal beamforming scheme in a Multiple-Input Single-Output (MISO) OWC system; furthermore Cho S, Chen G and Coon J P propose a non-orthogonal AN scheme for optimizing OWC system security performance in the case of random distribution of eavesdroppers. However, the above-mentioned secure communication scheme using AN utilizes spatial freedom, requires support of multiple light sources, and is not suitable for SISO single light source system.
Disclosure of Invention
Based on the above, the present invention provides a signal processing method based on time domain artificial noise, which is used for improving the security performance of a wireless Optical communication system of direct current biased Optical OFDM (DC-biased Optical OFDM, DCO-OFDM), and the core idea is to use a cyclic prefix in DCO-OFDM to construct artificial noise orthogonal to a legal channel, so as to improve the security rate of the system.
A communication method based on time domain artificial noise comprises the following steps: constructing artificial noise, constructing a transmitting signal and processing a receiving signal; constructing the artificial noise includes steps S11-S12: s11, initializing an artificial noise vector; s12, pre-coding the initialized artificial noise vector to generate target artificial noise orthogonal to a legal channel; the legal channel is a transmission channel from a transmitting terminal to a legal user; constructing the transmission signal includes steps S21 to S23: s21, carrying out Hermitian symmetry on the frequency domain complex signal of the transmitting signal; s22, performing inverse fast Fourier transform on the frequency domain signal subjected to Hermite symmetry to generate a time domain signal vector; s23, inserting a cyclic prefix into the generated time domain signal vector, and overlapping the target artificial noise to obtain a final transmitting signal; the processing of the received signal includes steps S31 to S33: s31, eliminating the cyclic prefix of the time domain signal received by the legal user and the time domain signal received by the eavesdropper, and then performing fast Fourier transform to correspondingly obtain the receiving frequency domain signal of the legal user and the receiving frequency domain signal of the eavesdropper; s32, respectively making Hermite inversion symmetry on the receiving frequency domain signal of the legal user and the receiving frequency domain signal of the eavesdropper, and correspondingly obtaining the frequency domain signal of the legal user and the frequency domain signal of the eavesdropper; s33, restoring the final received signal of the legal user by using the frequency domain signal of the legal user and the frequency domain channel matrix of the legal channel; and restoring the final received signal of the eavesdropper by using the eavesdropper frequency domain signal and the frequency domain channel matrix of the eavesdropper channel.
The invention has the beneficial effects that: the cyclic prefix in DCO-OFDM is utilized to construct time domain artificial noise orthogonal to a legal channel, and when the artificial noise passes through the legal channel, the artificial noise is mutually offset in the time domain due to multipath effect caused by reflection, so that the influence on a legal user is eliminated, only an eavesdropper is interfered, and the confidentiality of a communication system is improved. Meanwhile, the covariance matrix of the artificial noise is optimized according to the expression of the confidentiality rate, and the confidentiality performance of the system is further improved through the mode.
Drawings
FIG. 1 is a flow chart of the artifact assisted DCO-OFDM of the present invention;
FIG. 2 is a diagram of the secret rate R of the present inventionsA graph of the variation of the SNR with respect to the signal-to-noise ratio;
FIG. 3 is a diagram of the secret rate R of the present inventionsAnd (3) a change relation diagram of the artificial noise power ratio alpha.
Detailed Description
The invention is further described with reference to the following figures and detailed description of embodiments.
The embodiment of the invention provides a communication method based on time domain artificial noise, namely, the artificial noise is superposed on information to be transmitted in an optical signal transmitted by a transmitting terminal, and the artificial noise is used for improving the confidentiality of a DCO-OFDM wireless optical communication system. The core idea is that cyclic prefix in DCO-OFDM is utilized to construct artificial noise orthogonal to a legal channel, and when the artificial noise passes through the legal channel, the artificial noise is mutually offset in a time domain due to multipath effect caused by reflection, so that the artificial noise does not exist in a received signal of a legal user, the influence on the legal user is eliminated, and only interference is caused to an eavesdropper.
The embodiment of the invention considers a DCO-OFDM wireless optical communication system of three users. The transmitting end includes a single user named Alice, which transmits an optical signal using a single Light source, such as a Light Emitting Diode (LED) or a Laser Diode (LD). The receiving end includes a legitimate user named Bob and an eavesdropper named Eve, which receive the optical signal with a single photodetector such as a Photodiode (PD), respectively. The system flow is shown in fig. 1, and it should be noted that S/P in fig. 1 represents serial-to-parallel conversion, and P/S represents parallel-to-serial conversion.
The number of DCO-OFDM subcarriers is represented as 2N, and the length of the cyclic prefix is represented as NcpIn which N iscpDepending on the delay spread of the actual channel, 1/8 is typically taken for the number of OFDM subcarriers 2N. The insertion and elimination of cyclic prefix can be expressed by matrix transformation, and the insertion matrix and the elimination matrix are respectivelyAndwherein the content of the first and second substances,representing an identity matrix I of 2 Nx 2N2NLast NcpA matrix of rows, the superscript T representing the transpose of the matrix,the expression size is 2 NXNcpThe zero matrix of (2). For the receiving end, due to the multipath effect caused by the reflection of the light wave, the PD of the receiving end receives multiple paths of light signals, and the impulse responses of the first path of signals received by the legal user Bob and the eavesdropper Eve are respectively defined as hB(l) And hE(l) Where L is 0,1, …, L, and L denotes the maximum delay. h isB(l) And hE(l) The Line-of-Sight (LOS) component is indicated when l is 0, and the Non-Line-of-Sight (NLOS) component is indicated when l > 0.
The communication method based on the time domain artificial noise provided by the embodiment of the invention comprises the steps of constructing the artificial noise, constructing a transmitting signal and processing a receiving signal; wherein, constructing the artificial noise comprises steps S11-S12: s11, initializing an artificial noise vector z; s12, pre-coding the initialized artificial noise vector z to generate a target artificial noise a orthogonal to a legal channel; wherein, the legal channel is a transmission channel between a transmitting terminal and a legal user. Constructing the transmission signal includes steps S21 to S23: s21, carrying out Hermitian symmetry on the frequency domain complex signal S of the transmitting signal; s22, and converting the frequency domain signal S after Hermite symmetrySPerforming inverse fast Fourier transform to generate a time domain signal vector s; s23, inserting cyclic prefix into the generated time domain signal vector S, and superposing the target artificial noise to obtain a final emission signal xA. The processing of the received signal includes steps S31 to S33: s31, eliminating the cyclic prefix of the time domain signal received by the legal user and the time domain signal received by the eavesdropper, and then performing Fourier transform to correspondingly obtain the received frequency domain signal of the legal userAnd the received frequency domain signal of the eavesdropperS32, receiving frequency domain signals of legal users respectivelyAnd the received frequency domain signal of the eavesdropperMaking Hermite inverse symmetry to correspondingly obtain legal user frequency domain signal YBAnd an eavesdropper frequency domain signal YE(ii) a S33, utilizing legal user frequency domain signal YBAnd frequency domain channel matrix of legal channelRecovery of the final received signal of a legitimate userUsing the eavesdropper frequency domain signal YEAnd eavesdropping the frequency domain channel matrix of the channelRecovering the final received signal of the eavesdropperThe method comprises the following specific steps:
s11, the initial artificial noise can be expressed as a length NcpVector of (2)WhereinFor the real number domain, z follows a zero mean Gaussian distribution, and the covariance matrix is ∑z=E{zzTDenotes mathematical expectation, zTRepresenting the transpose of z.
S12, constructing a precoding matrix to precode the initialized artificial noise vector z, wherein the precoding matrix isAnd the column vector of G is located at RcpHBIn the null space of (a), i.e.:
RcpHBG=0 (1)
wherein the content of the first and second substances,the time domain channel matrix representing the time domain channel from the transmitting end to the legal user is a normal diagonal matrix, which can be written as:
similarly, h isB(l) Is replaced by hE(l) A time domain channel matrix H between the transmitting end and the eavesdropper can be obtainedE. Due to HBIs a lower triangular matrix and the diagonal element is greater than 0, so HBIs a reversible matrix, whereby the precoding matrix is
And precoding the initialized artificial noise vector z by using a precoding matrix, namely:
a=Gz (4)
wherein a is the vector representation of the target artificial noise obtained by pre-coding, andeach element in vector a represents an artificial noise symbol transmitted in each slot in one OFDM period. The target artificial noise a generated by pre-coding is orthogonal to the legal channel, so that it does not appear in the received signal of the legal user.
S21, since the transmitted time domain signal is real, hermitian symmetry is required for the complex signal in the frequency domain. Each OFDM block thus carries only (N-1) frequency domain symbols, with one complex vector S ═ S1,S2,…,SN-1]TRepresenting a frequency domain complex signal. The frequency domain signal obtained after Hermite symmetry is expressed asWherein
Wherein [ ·]*Representing conjugation.
S22, and then SSGenerating a time-domain signal vector s ═ F through Inverse Fast Fourier Transform (IFFT)HSS=[s1,s2,…,s2N-1]TWherein F and FHFast Fourier Transform (FFT) matrix and IFFT matrix are shown, respectively. The nth element of s can be represented as
Where Φ { · } represents the real part of the complex number, e is a natural constant. Will matrix 2FHThe middle 2 nd column to the Nth column form a submatrix defined asThen s can also be expressed as
After the time-domain signal S is generated S23, a cyclic prefix needs to be inserted to combat inter-symbol interference. The insertion of the cyclic prefix can be expressed in the form of a matrix transformation using a matrix of Tcp. Finally, adding the constructed target artificial noise a to form a final transmitting signal xAIs shown as
Considering the total power limit of the transmitted signal as P, the power allocated to the information part and the artificial noise part is PsAnd Pa. By alpha epsilon [0,1]Indicates assignment to PaIn a ratio of (i.e. P)a=αP,Ps=(1-α)PFor power PsAnd PaThe following constraints are satisfied:
where | · | | represents the euclidean norm and E {. denotes the mathematical expectation.
S31, after the legal user Bob receives the time domain signal, firstly eliminating the cyclic prefix, then carrying out fast Fourier transform, wherein the elimination of the cyclic prefix adopts a matrix RcpMatrix transformation is carried out, and after fast Fourier transformation, the receiving frequency domain signal of a legal user is obtainedIs composed of
Wherein the content of the first and second substances, andrespectively indicating the reception of a legal user and an eavesdropper in the ith time slotTo a frequency domain signal.Andrespectively representing Additive White Gaussian Noise (AWGN) received by Bob and Eve, and the noise power is sigma2,The expression size is (N)cp+2N)×(Ncp+2N) identity matrix.
Order toEquivalent to FRcpHBTcpFHAnd orderEquivalent to FRcpHETcpFHThen, thenAndcan be written in the form of a diagonal matrix, i.e. Wherein HB,iAnd HE,iRespectively representing the frequency responses of the ith subcarrier from the transmitting end Alice to the legitimate user Bob and the eavesdropper Eve.
S32, receiving frequency domain signal to legal userMaking Hermite inverse symmetry to obtain legal user frequency domain signal YB=[YB,1,...,YB,N-1]T(ii) a Receiving frequency domain signal for eavesdropperMaking Hermite inverse symmetry to obtain eavesdropper frequency domain signal YE=[YE,1,...,YE,N-1]TWherein:
s33, the frequency domain channel matrices of the legitimate user and the eavesdropper can be defined as:
wherein the content of the first and second substances,the definition given above is that of the matrix 2FHA submatrix formed by the 2 nd column to the Nth column; whileIs thatIs transposed, thereforeCan be composed ofAnd (6) obtaining.
Thus, YBAnd YECan be rewritten as:
finally, the signals recovered at the legal user receiving end and the eavesdropper receiving end are respectively:
in addition, in the case where the power allocated to the information part and the artificial noise part satisfies a preset constraint condition, the covariance matrix Σ is adjustedzTo maximize the privacy rate of the communication system. Secret rate RsExpressed as:
Rs=[Θ(S;YB)-Θ(S;YE)]+ (20)
wherein [ theta (S; Y)B)-Θ(S;YE)]+Representing 0 and [ theta (S; Y)B)-Θ(S;YE)]The largest of (A), Θ (S; Y)B) Frequency domain complex signal S representing transmission signal and legal user frequency domain signal YBMutual information between theta (S; Y)E) Frequency domain complex signal S representing transmission signal and eavesdropper frequency domain signal YEThe mutual information between them.
The goal of artificial noise optimization is to satisfy the power constraint (9) by adjusting sigmazMaximizing the privacy rate. The optimization problem is expressed as follows:
whereinRepresenting a covariance matrix ∑zSemi-positive nature of (2), constraint of E { | | a | | non-phosphor cells in (9)2}=Tr{GΣzGTAnd (4) represents the trace of the matrix.
Covariance matrix sigma of complex signal S in frequency domainS=E{SSTAt fixed, the mutual information in equation (20) depends on the probability distribution of S. Using signal processing techniques such as probability shaping, the mutual information can be maximized, and in particular, can be represented as
Wherein K is equivalent toIN-1An identity matrix of size (N-1) × (N-1) is represented. It can be seen that the expression in equation (22) is equal to ∑zIndependently, for equation (23), it can be approximated as:
it can be seen that the final expression of equation (24) has only the last term log2det(KΣzKH+4σ2IN-1) And sigmazIn this regard, optimization problem equation (21) may then be rewritten as:
this is a convex optimization problem that can be solved using algorithms such as gradient descent or interior point methods to maximize the privacy rate.
The effect of the present invention is verified by a specific example.
Consider a SISO DCO-OFDM OWC system comprising a single light source sender Alice, a single photodetector legitimate user Bob and a single photodetector eavesdropper Eve. OFDM comprises 64 subcarriers with 2N, length N of cyclic prefixcp8. Suppose AWGN has a power of σ2The Signal-to-Noise Ratio (SNR) can be expressed as SNR of 10log 110And P. The elements of the frequency domain complex signal S are assumed to be independent and uniformly distributed random variables, and the variance is betasI.e. covariance matrix of ∑S=E{SST}=βsIN-1,IN-1Is an identity matrix of (N-1) × (N-1). Wherein, betasSatisfies the power constraint (8), i.e. betasIs equivalent to
In addition, for the channel part, it is assumed that the line-of-sight channel gain is hB(0)=hE(0) 1. The non-line-of-sight channels have 6 channels and the gains are respectively hB(l)=γθB,lAnd hE(l)=γθE,lWhere l ═ 1.. 6. { θ }B,lAnd { theta }E,lAnd the independent and uniformly distributed random variables are uniformly distributed between 0 and 1, and the gamma is 0.3 to represent the attenuation coefficient of the reflection. FIG. 2 shows the secret rate RsRegarding the variation relationship of the SNR, the target artificial noise power ratio to be added is, in order, 0,0.1,0.2, 0.5. FIG. 3 shows RsRegarding the α variation relationship, the SNR is 10,20,30dB in order. Each RsChannel simulations were performed 100 times and then averaged. It can be seen that compared with the case of not adding artificial noise, i.e. α is 0, the security performance of the system can be significantly improved after adding artificial noise, and the security performance can be improved along with the improvement of α. However, when α reaches a threshold value, increasing α will causeThe power of the signal portion becomes less and less, which in turn impairs the security performance. As can be seen from fig. 3, the privacy performance is optimized when α ≈ 0.7 under the current channel conditions. In the case of a general channel, a is 0.5, which can achieve better security performance.
The foregoing is a more detailed description of the invention in connection with specific preferred embodiments and it is not intended that the invention be limited to these specific details. For those skilled in the art to which the invention pertains, several equivalent substitutions or obvious modifications can be made without departing from the spirit of the invention, and all the properties or uses are considered to be within the scope of the invention.
Claims (9)
1. A communication method based on time domain artificial noise is characterized by comprising the following steps: constructing artificial noise, constructing a transmitting signal and processing a receiving signal;
constructing the artificial noise includes steps S11-S12:
s11, initializing an artificial noise vector;
s12, pre-coding the initialized artificial noise vector to generate target artificial noise orthogonal to a legal channel; the legal channel is a transmission channel from a transmitting terminal to a legal user;
constructing the transmission signal includes steps S21 to S23:
s21, carrying out Hermitian symmetry on the frequency domain complex signal of the transmitting signal;
s22, performing inverse fast Fourier transform on the frequency domain signal subjected to Hermite symmetry to generate a time domain signal vector;
s23, inserting a cyclic prefix into the generated time domain signal vector, and overlapping the target artificial noise to obtain a final transmitting signal;
the processing of the received signal includes steps S31 to S33:
s31, eliminating the cyclic prefix of the time domain signal received by the legal user and the time domain signal received by the eavesdropper, and then performing fast Fourier transform to correspondingly obtain the receiving frequency domain signal of the legal user and the receiving frequency domain signal of the eavesdropper;
s32, respectively making Hermite inversion symmetry on the receiving frequency domain signal of the legal user and the receiving frequency domain signal of the eavesdropper, and correspondingly obtaining the frequency domain signal of the legal user and the frequency domain signal of the eavesdropper;
s33, restoring the final received signal of the legal user by using the frequency domain signal of the legal user and the frequency domain channel matrix of the legal channel; and restoring the final received signal of the eavesdropper by using the eavesdropper frequency domain signal and the frequency domain channel matrix of the eavesdropper channel.
2. The time-domain artificial noise-based communication method according to claim 1, wherein the insertion and removal of the cyclic prefix are implemented in the form of matrix transformation, and the insertion matrix and the removal matrix are respectivelyAndwherein the content of the first and second substances,representing an identity matrix I of 2 Nx 2N2NLast NcpA matrix of rows, the superscript T representing the transpose of the matrix,the expression size is 2 NXNcpZero matrix of, NcpAnd 2N is the OFDM subcarrier number of the communication system for the length of the cyclic prefix.
3. The time-domain artifact-based communication method as claimed in claim 2, wherein the artifact vector is initialized to a length N in step S11cpA vector z ofWhereinFor the real number domain, z follows a zero mean Gaussian distribution, and the covariance matrix is ∑z=E{zzTDenotes mathematical expectation, zTRepresenting the transpose of z.
4. The time-domain artificial noise based communication method according to claim 3, wherein the precoding matrix for precoding the initialized artificial noise vector in step S12 isAnd the column vector of G is located at RcpHBIn the null space of (1), i.e. RcpHBG=0,The time domain channel matrix from the transmitting terminal to the legal user is a normal diagonal matrix; thus, the precoding matrixWhereinRepresents HBThe inverse of (1);
5. A time-domain artificial noise based communication method according to claim 3, wherein the power allocated to the information part and the artificial noise part satisfies a preset constraint condition under a total power limit of the final transmitted signal.
6. The time-domain artificial noise based communication method according to claim 5, wherein the preset constraint condition is:
in the case where the total power limit of the final transmission signal is P, the power allocated to the information part and the artificial noise part is PsAnd PaUsing α ∈ [0,1 ]]Indicates assignment to PaIn a ratio of (i.e. P)a=αP,PsFor power P, (1- α) PsAnd PaThe following constraints are satisfied:
where E {. denotes a mathematical expectation, vector a denotes the target artificial noise, and vector s denotes the time-domain signal vector.
7. The time-domain artifact-based communication method as claimed in claim 2, wherein said final transmitted signal formed in step S23 is xA=Tcps + a, vector s representing the time-domain signal vector, and vector a representing the target artifact.
8. The time-domain artifact-based communication method as claimed in claim 1, wherein in step S33:
restoring the final received signal of the legal user by using the frequency domain signal of the legal user and the frequency domain channel matrix of the legal channel, wherein the restoring comprises the following steps:whereinI.e. the final received signal of the legitimate user,frequency domain channel matrix for legal channelInverse of (A), (B), (C), (BThe legal user frequency domain signal;
restoring the final received signal of the eavesdropper by using the frequency domain signal of the eavesdropper and the frequency domain channel matrix of the eavesdropper channel, wherein the method comprises the following steps:whereinI.e. the final received signal of the eavesdropper,frequency domain channel matrix for eavesdropping on channelInverse of (A), (B), (C), (EIs the eavesdropper frequency domain signal.
9. The time-domain artifact-based communication method as recited in claim 5, further comprising: in the case where the power allocated to the information part and the artificial noise part satisfies a preset constraint condition, by adjusting the covariance matrix ΣzTo maximize the privacy rate of the communication system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110030405.XA CN112887248B (en) | 2021-01-11 | 2021-01-11 | Communication method based on time domain artificial noise |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110030405.XA CN112887248B (en) | 2021-01-11 | 2021-01-11 | Communication method based on time domain artificial noise |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112887248A true CN112887248A (en) | 2021-06-01 |
CN112887248B CN112887248B (en) | 2022-02-15 |
Family
ID=76047756
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110030405.XA Active CN112887248B (en) | 2021-01-11 | 2021-01-11 | Communication method based on time domain artificial noise |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112887248B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114301567A (en) * | 2021-12-28 | 2022-04-08 | 绿盟科技集团股份有限公司 | Communication method and device based on artificial noise |
CN115865581A (en) * | 2022-11-02 | 2023-03-28 | 电子科技大学 | Artificial noise elimination method based on principal component analysis |
CN115987724A (en) * | 2022-12-23 | 2023-04-18 | 清华大学深圳国际研究生院 | Channel estimation method for underwater wireless optical communication |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018119935A1 (en) * | 2016-12-29 | 2018-07-05 | 深圳天珑无线科技有限公司 | Multi-antenna wireless communication method and multi-antenna communication apparatus |
CN108712228A (en) * | 2018-05-03 | 2018-10-26 | 电子科技大学 | A kind of optimal safe transmission method of anti-eavesdrop based on cooperation interference |
US20190229833A1 (en) * | 2018-01-24 | 2019-07-25 | Korea Advanced Institute Of Science And Technology | Apparatus and method for secure communication using artificial noise scheme |
CN110880950A (en) * | 2019-11-13 | 2020-03-13 | 电子科技大学 | Safe transmission method for artificial noise auxiliary vector disturbance precoding in MIMO system |
-
2021
- 2021-01-11 CN CN202110030405.XA patent/CN112887248B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018119935A1 (en) * | 2016-12-29 | 2018-07-05 | 深圳天珑无线科技有限公司 | Multi-antenna wireless communication method and multi-antenna communication apparatus |
US20190229833A1 (en) * | 2018-01-24 | 2019-07-25 | Korea Advanced Institute Of Science And Technology | Apparatus and method for secure communication using artificial noise scheme |
CN108712228A (en) * | 2018-05-03 | 2018-10-26 | 电子科技大学 | A kind of optimal safe transmission method of anti-eavesdrop based on cooperation interference |
CN110880950A (en) * | 2019-11-13 | 2020-03-13 | 电子科技大学 | Safe transmission method for artificial noise auxiliary vector disturbance precoding in MIMO system |
Non-Patent Citations (2)
Title |
---|
TOMOKI AKITAYA 等: ""Time-domain artificial noise generation technique using time-domain and frequency-domain processing for physical layer security in MIMO-OFDM systems"", 《2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC)》 * |
刘德春等: "基于OFDM系统物理层安全的滤波器及人工噪声设计", 《自动化技术与应用》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114301567A (en) * | 2021-12-28 | 2022-04-08 | 绿盟科技集团股份有限公司 | Communication method and device based on artificial noise |
CN114301567B (en) * | 2021-12-28 | 2023-07-28 | 绿盟科技集团股份有限公司 | Communication method and device based on artificial noise |
CN115865581A (en) * | 2022-11-02 | 2023-03-28 | 电子科技大学 | Artificial noise elimination method based on principal component analysis |
CN115865581B (en) * | 2022-11-02 | 2024-04-19 | 电子科技大学 | Artificial noise elimination method based on principal component analysis |
CN115987724A (en) * | 2022-12-23 | 2023-04-18 | 清华大学深圳国际研究生院 | Channel estimation method for underwater wireless optical communication |
Also Published As
Publication number | Publication date |
---|---|
CN112887248B (en) | 2022-02-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112887248B (en) | Communication method based on time domain artificial noise | |
Meng et al. | Omnidirectional precoding based transmission in massive MIMO systems | |
Ramadan et al. | Hybrid analog–digital precoding design for secrecy mmWave MISO-OFDM systems | |
Yan et al. | Secret channel training to enhance physical layer security with a full-duplex receiver | |
Meng et al. | Omnidirectional space-time block coding for common information broadcasting in massive MIMO systems | |
CN111614387B (en) | Safe transmission method in large-scale antenna system | |
WO2017219389A1 (en) | Methods for sending and receiving synchronization signals and signals subjected to perfect omnidirectional pre-coding in large-scale mimo system | |
Guo et al. | Superposed 32QAM constellation design for 2× 2 spatial multiplexing MIMO VLC systems | |
Gao et al. | Mutual information maximizing wideband multi-user (wMU) mmWave massive MIMO | |
Yang et al. | Artificial noise design in time domain for indoor SISO DCO-OFDM VLC wiretap systems | |
Uwaechia et al. | Compressed channel estimation for massive MIMO-OFDM systems over doubly selective channels | |
Meng et al. | Constant-envelope omni-directional transmission with diversity in massive MIMO systems | |
Wu et al. | A unified mathematical model for spatial scrambling based secure wireless transmission and its wiretap method | |
Zhang et al. | Space-frequency block code with matched rotation for MIMO-OFDM system with limited feedback | |
You et al. | Spatial and directional modulation with scrambling | |
Zhang et al. | Impact of imperfect angle estimation on spatial and directional modulation | |
CN111404587A (en) | Multi-user MIMO symmetrical channel characteristic obtaining method based on conjugate precoding | |
Luo et al. | Secure spatial modulation via radio frequency mirrors | |
Wu et al. | Total secrecy from anti-eavesdropping channel estimation | |
Chen et al. | Sparse code multiple access over universal filtered multicarrier | |
Shen et al. | Low-complexity leakage-based secure precise wireless transmission with hybrid beamforming | |
Liu et al. | Transmit filter and artificial noise aided physical layer security for OFDM systems | |
Bayraktar et al. | Adaptation of code-domain NOMA to SC-FDE based overloaded mmWave hybrid massive MIMO | |
Choi et al. | Secret key transmission based on channel reciprocity for secure IoT | |
Hong et al. | Power Allocation for Reducing PAPR of Artificial‐Noise‐Aided Secure Communication System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |